- Phantasma Explorer -

Transaction Information
Descriptioncrypt0warr10r sent GHOST - NFT #81229689129247046887681149769878195373771330664846854184228155360707526321669 to criptera
Feescrypt0warr10r paid 0.00098 KCAL in fees.
block received 0.00098 KCAL in fees.
crypt0warr10r paid 0.00098 KCAL to crown rewards.
crypt0warr10r burned 0.00195 KCAL.
Date2/7/21 2:35:18 PM UTC
Transaction Hash1D4D330F425D5607A1F1620C15235E797953D8ECEB4EA3C7CE6A1E99D8668FCB
PayloadPGT2.0.2
Result-
Expiration2/7/21 2:55:06 PM UTC
Nexusmainnet
Chainmain
Block Hash4FD81870BEA6AA4CD281163B8BD83B684FB45008A123C6765522A21D0ABFA041
Transaction Script

Raw

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

Disassembly

000: LOAD r0, 800
007: PUSH r0
009: LOAD r0, 100000
017: PUSH r0
019: LOAD r0, 2200000000000000000000000000000000000000000000000000000000000000000000
058: PUSH r0
060: LOAD r0, 220100D35734E4E41E0319C80A86907FF65BC4E5BEECFDAA15701B0F7BC0AD8B816355
099: PUSH r0
101: LOAD r0, "AllowGas"
113: PUSH r0
115: LOAD r0, "gas"
122: CTX r0, r1
125: SWITCH r1
127: LOAD r0, 81229689129247046887681149769878195373771330664846854184228155360707526321669
164: PUSH r0
166: LOAD r0, "GHOST"
175: PUSH r0
177: LOAD r0, 220100DEAA34BE1D9FCD9C91AA410EC38700A6BE4F738A60EAE71D0ED36590BE318028
216: PUSH r0
218: LOAD r0, 220100D35734E4E41E0319C80A86907FF65BC4E5BEECFDAA15701B0F7BC0AD8B816355
257: PUSH r0
259: LOAD r0, "Runtime.TransferToken"
284: EXTCALL r0
286: LOAD r0, 220100D35734E4E41E0319C80A86907FF65BC4E5BEECFDAA15701B0F7BC0AD8B816355
325: PUSH r0
327: LOAD r0, "SpendGas"
339: PUSH r0
341: LOAD r0, "gas"
348: CTX r0, r1
351: SWITCH r1
353: RET
Transaction Events
KindAddressContractContent
TokenStakecrypt0warr10rgas044B43414C0500B4C40400046D61696E
GasEscrowcrypt0warr10rgas2202000D6E4079E36703EBD37C00722F5891D28B0E2811DC114B129215123ADCCE360504A086010003200300
TokenSendcrypt0warr10rentry0547484F53542105E638661EF058A6A72AA6B97C10BD857A14C9495BF9EF7D580BC65DF15F96B300046D61696E
TokenReceivecripteraentry0547484F53542105E638661EF058A6A72AA6B97C10BD857A14C9495BF9EF7D580BC65DF15F96B300046D61696E
GasPaymentcrypt0warr10rgas2202000D6E4079E36703EBD37C00722F5891D28B0E2811DC114B129215123ADCCE360504A086010003870100
TokenClaimcrypt0warr10rgas044B43414C05A015700200046D61696E
TokenBurngasgas044B43414C05E08B290100046D61696E
CrownRewardscrypt0warr10rgas044B43414C0440899500046D61696E
TokenClaimblockgas044B43414C0440899500046D61696E